2021-01-19 04:48:03 +00:00
require 'net/ssh'
require 'pathname'
2021-04-19 01:29:53 +00:00
require 'fileutils'
2021-01-19 04:48:03 +00:00
namespace :create_site do
desc " Detect sites "
task :detect_sites , [ :detect_name ] = > :environment do | task , args |
Multithread . where ( :key = > 'detect_sites' ) . each { | thread | thread . destroy if ( thread . status [ " status " ] == " error " || thread . status [ " status " ] == " finish " ) }
2021-04-19 01:29:53 +00:00
Multithread . where ( :key = > 'detect_sites' ) . destroy
2021-01-19 04:48:03 +00:00
@thread = Multithread . where ( :key = > 'detect_sites' ) . first
2021-08-11 08:16:14 +00:00
@type = " exec_all "
2021-01-19 04:48:03 +00:00
if @thread . nil?
begin
@thread = Multithread . create ( :key = > 'detect_sites' , :status = > { " infos " = > [ ] , " status " = > " detecting " } )
if ( args . detect_name . nil? rescue true )
2021-08-11 08:16:14 +00:00
site_servers = SiteServer . all . where ( :active = > true ) . to_a
2021-01-19 04:48:03 +00:00
else
site_servers = SiteServer . where ( :server_name = > args . detect_name ) . to_a
end
site_servers . each do | site_server |
@site_server = site_server
update_thread_infos ( " <span style='color: skyblue;'> " + @site_server . server_name + " </span> " )
@password = @site_server . password
begin
begin
Net :: SSH . start ( @site_server . ip , @site_server . account , password : @site_server . password ) do | ssh |
end
rescue Net :: SSH :: HostKeyMismatch
system ( " ssh-keygen -f \" $HOME/.ssh/known_hosts \" -R #{ @site_server . ip } " )
rescue Errno :: ENOTTY
system ( " ssh-add \" $HOME/.ssh/id_rsa \" " )
rescue = > e
update_thread_infos ( e . to_s )
next
end
Net :: SSH . start ( @site_server . ip , @site_server . account , password : @site_server . password ) do | ssh |
2021-08-11 10:25:03 +00:00
certbot_path = exec_ssh_command_by_sudo_and_see_output ( ssh , " bash -l -c 'which certbot certbot-auto' " , false , true ) . strip . split ( " \n " ) [ 0 ]
2021-08-11 08:16:14 +00:00
@site_server . has_certbot = certbot_path . present?
@site_server . save
if @site_server . has_certbot
update_thread_infos ( " Checking certbot renew cronjob... " )
crontab_lines = exec_ssh_command_by_sudo_and_see_output ( ssh , " sudo -p 'sudo password:' crontab -l " , false , false )
certbot_renew_command = crontab_lines . select { | l | l . include? ( " certbot " ) && l . include? ( " renew " ) } [ 0 ]
unless certbot_renew_command
update_thread_infos ( " Add certbot renew cronjob! " )
certbot_renew_command = " 30 2 * * 1 #{ certbot_path } renew --no-self-upgrade --post-hook 'sudo service nginx restart' > /var/log/le-renew.log "
update_thread_infos ( certbot_renew_command )
exec_ssh_command_by_sudo_and_see_output ( ssh , " CRON= \" #{ certbot_renew_command } \" && (sudo -p 'sudo password:' crontab -l; echo \" \ $CRON \" ) | sudo -p 'sudo password:' crontab - " , false )
end
end
2021-02-18 02:38:51 +00:00
nginx_include_dir = exec_command_by_user ( ssh , 'grep include /etc/nginx/nginx.conf | grep -v "\#\|include /etc/nginx/mime.types\|include /etc/nginx/conf.d/\*.conf\|/etc/nginx/sites-enabled/\*"' )
2021-02-17 16:59:11 +00:00
nginx_include_dir = nginx_include_dir . gsub ( / include|;| \ n / , '' ) . strip
2021-01-19 04:48:03 +00:00
domain_name = @site_server . domain_name #'serv.rulingcom.com'
2021-08-11 10:25:03 +00:00
server_names = exec_command_by_user ( ssh , " grep -H 'server_name' -r #{ nginx_include_dir } " )
2021-02-17 16:59:11 +00:00
server_names_array = server_names . scan ( / (.*):[ \ t]*server_name[ \ t]+(.*); / )
server_names_array = server_names_array . group_by { | v | v [ 0 ] }
2021-08-11 10:25:03 +00:00
2021-02-17 16:59:11 +00:00
server_names_array . each do | nginx_file , server_name_with_file |
server_names_for_site = server_name_with_file . map { | v | v [ 1 ] . split ( / [ | \ t]+ / ) } . flatten . uniq - [ " localhost " , " 127.0.0.1 " ]
server_name_list = [ ]
server_names_for_site . each do | server_name_for_site |
if ! server_name_for_site . include? ( domain_name )
next if ! ` nslookup " #{ server_name_for_site } " ` . include? ( @site_server . ip )
2021-01-19 04:48:03 +00:00
end
2021-02-17 16:59:11 +00:00
server_name_list << server_name_for_site
end
server_name = server_name_list . join ( ' ' )
2021-08-11 08:16:14 +00:00
nginx_file_content = exec_ssh_command_by_sudo_and_see_output ( ssh , " cat #{ nginx_file } " , false , true )
2021-12-03 03:12:40 +00:00
site_path = Pathname . new ( exec_ssh_command_by_sudo_and_see_output ( ssh , " echo `grep root #{ nginx_file } | grep -v -e ' # .*root'` " , false , true ) . to_s . split ( " \n " ) . first . to_s . strip . split ( " ; " ) . select { | s | s . present? && s . include? ( " root " ) } . first . split ( " root " ) . last . to_s . strip ) . dirname . to_s rescue nil
next if site_path . nil?
2021-02-17 16:59:11 +00:00
if site_path . present? && exec_ssh_command_by_sudo ( ssh , " ls #{ site_path } " ) . split . length != 0 && exec_ssh_command_by_sudo ( ssh , " ls #{ site_path } /Gemfile " ) . include? ( " No such file or directory " )
SiteConstruct . where ( :server_type = > @site_server . server_name , :domain_name = > server_name ) . destroy
next
end
path = Pathname . new ( site_path ) . dirname . to_s
site_name = Pathname . new ( site_path ) . basename . to_s
server_type = @site_server . server_name
2021-04-19 01:29:53 +00:00
port = exec_ssh_command_by_sudo_and_see_output ( ssh , " grep 'listen' #{ nginx_file } | grep -v -e ' # .*listen' " , false ) . flat_map { | s | s . split ( / ( \ r \ n| \ n) / ) } . map { | s | s . match ( / listen \ s+( \ d+) / ) [ 1 ] rescue nil } . select { | s | s . present? } . uniq
2021-02-17 16:59:11 +00:00
db_name = exec_ssh_command_by_sudo ( ssh , " echo `cat #{ site_path } /config/mongoid.yml | grep 'database'` " ) . split ( " database: " ) . last . strip
db_name = site_name . gsub ( " - " , " _ " ) if db_name . include? ( " No such file or directory " )
unicorn_sock_path = exec_ssh_command_by_sudo ( ssh , " echo `grep 'server unix' #{ nginx_file } | grep -v -e ' # .*server unix'` " ) . strip . split ( " server unix " ) . last . strip . split ( " : " ) . last . strip rescue ( site_path + " /tmp/unicorn.sock " )
if Pathname . new ( path ) . basename . to_s == " orbit_sites " || Pathname . new ( path ) . basename . to_s == " housing_sites " || Pathname . new ( path ) . basename . to_s == " dev_sites " || Pathname . new ( path ) . dirname . to_s == " /home "
school_name = nil
site_type = " Gravity "
else
school_name = Pathname . new ( path ) . basename . to_s
site_type = " School "
end
pid_infos = exec_ssh_command_by_sudo ( ssh , " fuser #{ unicorn_sock_path } " ) . to_s . strip . gsub ( " \n " , " " )
if pid_infos . length != 0 && ! pid_infos . include? ( " not exist " ) && ! pid_infos . include? ( " No such file or directory " )
status = " finish "
else
bundle_show_info = exec_ssh_command_by_sudo ( ssh , " bash -l -c 'cd #{ site_path } ;bundle show' " )
if bundle_show_info . include? ( " is not yet checked out " ) || bundle_show_info . include? ( " No such file or directory " )
status = " "
2021-01-19 04:48:03 +00:00
else
2021-02-17 16:59:11 +00:00
status = " closed "
2021-01-19 04:48:03 +00:00
end
end
2021-04-19 01:29:53 +00:00
site_constructs = SiteConstruct . where ( :server_type = > server_type , :nginx_file = > nginx_file ) . to_a
2021-02-17 16:59:11 +00:00
site_construct = site_constructs [ 0 ]
Array ( site_constructs [ 1 .. - 1 ] ) . each do | s |
s . destroy
end
2021-02-25 07:35:15 +00:00
cert_ver_added_text = exec_command_by_user ( ssh , " cat #{ nginx_file } " ) . scan ( / [ \ t]*location(?:(?!location.*{).)+{ # add_by_site_module.*} /m ) [ 0 ]
2021-04-19 12:40:34 +00:00
update_thread_infos ( " Detect <a href=' #{ ( ( port [ 0 ] == " 443 " ) ? " https " : " http " ) } :// #{ server_name } #{ ( ( port [ 0 ] == " 80 " || port [ 0 ] == " 443 " ) ? " " : ( ':' + port [ 0 ] ) ) } '> #{ server_name } </a> " . html_safe ) rescue nil
2021-02-17 16:59:11 +00:00
if site_construct . nil?
2021-02-25 07:35:15 +00:00
site_construct = SiteConstruct . create ( :server_type = > server_type , :site_name = > site_name , :domain_name = > server_name , :nginx_file = > nginx_file , :db_name = > db_name , :port = > port , :path = > path , :site_type = > site_type , :school_name = > school_name , :user_id = > User . first . id , :status = > status , :cert_ver_added_text = > cert_ver_added_text )
2021-02-17 16:59:11 +00:00
else
2021-02-25 07:35:15 +00:00
site_construct . update ( :server_type = > server_type , :site_name = > site_name , :domain_name = > server_name , :nginx_file = > nginx_file , :db_name = > db_name , :port = > port , :path = > path , :site_type = > site_type , :school_name = > school_name , :user_id = > User . first . id , :status = > status , :cert_ver_added_text = > cert_ver_added_text )
2021-02-17 16:59:11 +00:00
end
2021-04-14 10:55:07 +00:00
default_rails_env = 'development'
enable_rails_env = [ 'development' , 'production' ]
rails_env = default_rails_env
cmd_output = exec_ssh_command_by_sudo_and_see_output ( ssh , " ps -o args= -p `cat #{ site_construct . path } / #{ site_construct . site_name } /tmp/pids/unicorn.pid` " , false ) rescue [ ]
enable_rails_env . each do | env |
if ( cmd_output [ 0 ] . include? ( env ) rescue false )
rails_env = env
break
elsif ( cmd_output [ 0 ] . include? ( " No such file or directory " ) rescue false )
site_construct . update ( :status = > " closed " )
break
end
end
site_construct . update ( :rails_env = > rails_env )
2021-10-08 12:04:38 +00:00
crt_file_path = nginx_file_content . match ( / (?<=! # |^) \ s*ssl_certificate \ s+(.*) / ) [ 1 ] . split ( ';' ) . first rescue ''
private_key_path = nginx_file_content . match ( / (?<=! # |^) \ s*ssl_certificate_key \ s+(.*) / ) [ 1 ] . split ( ';' ) . first rescue ''
2021-04-19 01:29:53 +00:00
site_cert = nil
if crt_file_path . present? || private_key_path . present?
site_cert = site_construct . site_cert
if site_cert . nil?
site_cert = SiteCert . where ( :source_paths = > [ crt_file_path , private_key_path ] ) . first
site_cert = SiteCert . new if site_cert . nil?
end
if true #site_cert.source_paths.count == 0
site_cert [ " cert_file " ] = File . basename ( crt_file_path )
cert_file_store_path = site_cert . cert_file . file . file
crt_file_content = exec_ssh_command_by_sudo_and_see_output ( ssh , " cat #{ crt_file_path } " , false ) . select { | s | s . present? } . join ( " \n " ) . strip . split ( / ( \ r \ n| \ n) / ) . select { | s | s . present? } . join ( " \n " )
FileUtils . mkdir_p ( File . dirname ( cert_file_store_path ) ) unless Dir . exist? ( File . dirname ( cert_file_store_path ) )
2021-12-01 12:37:26 +00:00
File . open ( cert_file_store_path , 'w+' ) { | f | f . write ( crt_file_content ) }
2021-04-19 01:29:53 +00:00
site_cert [ " private_key " ] = File . basename ( private_key_path )
private_key_store_path = site_cert . private_key . file . file
private_key_content = exec_ssh_command_by_sudo_and_see_output ( ssh , " cat #{ private_key_path } " , false ) . select { | s | s . present? } . join ( " \n " ) . strip . split ( / ( \ r \ n| \ n) / ) . select { | s | s . present? } . join ( " \n " )
2021-12-01 12:37:26 +00:00
FileUtils . mkdir_p ( File . dirname ( private_key_store_path ) ) unless Dir . exist? ( File . dirname ( private_key_store_path ) )
File . open ( private_key_store_path , 'w+' ) { | f | f . write ( private_key_content ) }
2021-04-19 01:29:53 +00:00
site_cert . source_paths = [ crt_file_path , private_key_path ]
2021-08-11 08:16:14 +00:00
site_cert . is_certbot = private_key_path . include? ( " letsencrypt " )
2021-04-19 01:29:53 +00:00
site_cert . save
site_construct . update ( :site_cert = > site_cert )
end
2021-04-19 12:35:16 +00:00
if nginx_file_content . match ( / \ s*return \ s+30[12] \ s+https: \/ \/ \ $host \ $request_uri \ s*; / )
site_construct . update ( :redirect_to_https = > true )
else
site_construct . update ( :redirect_to_https = > false )
end
2021-04-19 01:29:53 +00:00
end
2021-01-19 04:48:03 +00:00
end
end
end
end
2021-02-19 07:57:30 +00:00
SiteConstruct . where ( :domain_name . in = > [ nil , '' , 'localhost' , '127.0.0.1' ] ) . destroy
2021-01-19 04:48:03 +00:00
@thread . update ( :status = > @thread . status . merge ( { " status " = > " finish " } ) )
rescue = > e
2021-02-17 16:59:11 +00:00
puts [ e , e . backtrace ]
@thread . update ( :status = > { " infos " = > @thread . status [ " infos " ] . push ( e . to_s ) , " status " = > " error " } )
2021-01-19 04:48:03 +00:00
end
end
end
def exec_ssh_command_by_sudo ( session , command )
output = session . exec! ( " echo ' #{ @password } ' | sudo -S #{ command } " )
# output = session.exec!("echo '#{@password}' | sudo -S -s #{command}")
if output . include? ( " sudo: " ) && output . include? ( " command not found " )
output = session . exec! ( command )
end
return output
end
def update_thread_infos ( info )
puts info
@thread . status [ " infos " ] = @thread . status [ " infos " ] . push ( info )
@thread . save!
return @thread . status [ " infos " ]
end
end